Vulnerabilities > Improper Locking

DATE CVE VULNERABILITY TITLE RISK
2002-12-31 CVE-2002-1869 Improper Locking vulnerability in Heysoft Eventsave and Eventsave+
Heysoft EventSave 5.1 and 5.2 and Heysoft EventSave+ 5.1 and 5.2 does not check whether the log file can be written to, which allows attackers to prevent events from being recorded by opening the log file using an application such as Microsoft's Event Viewer.
local
low complexity
heysoft CWE-667
3.3
2002-12-31 CVE-2002-1850 Improper Locking vulnerability in Apache Http Server 2.0.39/2.0.40
mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote attackers to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.
network
low complexity
apache CWE-667
7.5
2002-04-04 CVE-2002-0051 Improper Locking vulnerability in Microsoft Windows 2000
Windows 2000 allows local users to prevent the application of new group policy settings by opening Group Policy files with exclusive-read access.
local
low complexity
microsoft CWE-667
7.8
2001-08-31 CVE-2000-1198 Improper Locking vulnerability in Qualcomm Qpopper 2.53/3.0
qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes.
local
low complexity
qualcomm CWE-667
5.5
2001-08-29 CVE-2001-0682 Improper Locking vulnerability in multiple products
ZoneAlarm and ZoneAlarm Pro allows a local attacker to cause a denial of service by running a trojan to initialize a ZoneAlarm mutex object which prevents ZoneAlarm from starting.
local
low complexity
zonelabs checkpoint CWE-667
5.5
2000-04-23 CVE-2000-0338 Improper Locking vulnerability in Concurrent Versions Software Project Concurrent Versions Software
Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creating the lock directory before it is created for use by a legitimate CVS user.
5.5